Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- trash: Added new job source 0x56115bc830a0 (GVfsBackendTrash)
- trash: Queued new job 0x56115bc83840 (GVfsJobMount)
- trash: send_reply(0x56115bc83840), failed=0 ()
- trash: backend_dbus_handler org.gtk.vfs.Mount:CreateFileMonitor (pid=21265)
- trash: Queued new job 0x56115bc83ba0 (GVfsJobCreateMonitor)
- trash: send_reply(0x56115bc83ba0), failed=0 ()
- trash: backend_dbus_handler org.gtk.vfs.Mount:CreateFileMonitor (pid=21265)
- trash: Queued new job 0x56115bc83ba0 (GVfsJobCreateMonitor)
- trash: send_reply(0x56115bc83ba0), failed=0 ()
- trash: backend_dbus_handler org.gtk.vfs.Mount:QueryInfo (pid=21265)
- trash: Queued new job 0x56115bc6bb50 (GVfsJobQueryInfo)
- trash: send_reply(0x56115bc6bb50), failed=0 ()
- trash: backend_dbus_handler org.gtk.vfs.Mount:QueryInfo (pid=21265)
- trash: Queued new job 0x56115bc6bbf0 (GVfsJobQueryInfo)
- trash: send_reply(0x56115bc6bbf0), failed=0 ()
- smb-network: g_vfs_backend_smb_browse_init: default workgroup = 'NULL'
- smb-network: Added new job source 0x55898e0b2080 (GVfsBackendSmbBrowse)
- smb-network: Queued new job 0x55898e0b59c0 (GVfsJobMount)
- INFO: Current debug levels:
- all: 10
- tdb: 10
- printdrivers: 10
- lanman: 10
- smb: 10
- rpc_parse: 10
- rpc_srv: 10
- rpc_cli: 10
- passdb: 10
- sam: 10
- auth: 10
- winbind: 10
- vfs: 10
- idmap: 10
- quota: 10
- acls: 10
- locking: 10
- msdfs: 10
- dmapi: 10
- registry: 10
- scavenger: 10
- dns: 10
- ldb: 10
- tevent: 10
- auth_audit: 10
- auth_json_audit: 10
- kerberos: 10
- drs_repl: 10
- smb2: 10
- smb2_credits: 10
- dsdb_audit: 10
- dsdb_json_audit: 10
- dsdb_password_audit: 10
- dsdb_password_json_audit: 10
- dsdb_transaction_audit: 10
- dsdb_transaction_json_audit: 10
- dsdb_group_audit: 10
- dsdb_group_json_audit: 10
- Using netbios name HOST.
- Using workgroup SAMBA.
- smb-network: do_mount - URI = smb://192.168.0.100
- smb-network: do_mount - try #0
- parsed path: fname='smb://192.168.0.100' server='192.168.0.100' share='' path='' options=''
- SMBC_check_options(): server='192.168.0.100' share='' path='' options=''
- smb-network: looking up cached server '192.168.0.100'\'IPC$', user 'SAMBA';'jason'
- smb-network: returning (nil)
- smb-network: auth_callback - anonymous pass
- smb-network: auth_callback - out: last_user = 'jason', last_domain = 'SAMBA'
- smb-network: looking up cached server '192.168.0.100'\'IPC$', user 'SAMBA';'jason'
- smb-network: returning (nil)
- smb-network: looking up cached server '192.168.0.100'\'IPC$', user 'SAMBA';'jason'
- smb-network: returning (nil)
- smb-network: auth_callback - anonymous pass
- smb-network: auth_callback - out: last_user = 'jason', last_domain = 'SAMBA'
- smb-network: looking up cached server '192.168.0.100'\'IPC$', user 'SAMBA';'jason'
- smb-network: returning (nil)
- SMBC_server: server_n=[192.168.0.100] server=[192.168.0.100]
- -> server_n=[192.168.0.100] server=[192.168.0.100]
- Connecting to 192.168.0.100 at port 139
- socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=87040, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
- Kerberos auth with 'jason@SAMBA' (SAMBA\jason) to access '192.168.0.100' not possible
- SPNEGO login failed: {Access Denied} A process has requested access to an object but has not been granted those access rights.
- cli_session_setup_spnego_send: Connect to 192.168.0.100 as (null) using SPNEGO
- GENSEC backend 'gssapi_spnego' registered
- GENSEC backend 'gssapi_krb5' registered
- GENSEC backend 'gssapi_krb5_sasl' registered
- GENSEC backend 'spnego' registered
- GENSEC backend 'schannel' registered
- GENSEC backend 'naclrpc_as_system' registered
- GENSEC backend 'sasl-EXTERNAL' registered
- GENSEC backend 'ntlmssp' registered
- GENSEC backend 'ntlmssp_resume_ccache' registered
- GENSEC backend 'http_basic' registered
- GENSEC backend 'http_ntlm' registered
- GENSEC backend 'http_negotiate' registered
- Starting GENSEC mechanism spnego
- Starting GENSEC submechanism ntlmssp
- negotiate: struct NEGOTIATE_MESSAGE
- Signature : 'NTLMSSP'
- MessageType : NtLmNegotiate (1)
- NegotiateFlags : 0x62088215 (1644724757)
- 1: NTLMSSP_NEGOTIATE_UNICODE
- 0: NTLMSSP_NEGOTIATE_OEM
- 1: NTLMSSP_REQUEST_TARGET
- 1: NTLMSSP_NEGOTIATE_SIGN
- 0: NTLMSSP_NEGOTIATE_SEAL
- 0: NTLMSSP_NEGOTIATE_DATAGRAM
- 0: NTLMSSP_NEGOTIATE_LM_KEY
- 0: NTLMSSP_NEGOTIATE_NETWARE
- 1: NTLMSSP_NEGOTIATE_NTLM
- 0: NTLMSSP_NEGOTIATE_NT_ONLY
- 0: NTLMSSP_ANONYMOUS
- 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
- 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- 0: NTLMSSP_TARGET_TYPE_DOMAIN
- 0: NTLMSSP_TARGET_TYPE_SERVER
- 0: NTLMSSP_TARGET_TYPE_SHARE
- 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- 0: NTLMSSP_NEGOTIATE_IDENTIFY
- 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
- 0: NTLMSSP_NEGOTIATE_TARGET_INFO
- 1: NTLMSSP_NEGOTIATE_VERSION
- 1: NTLMSSP_NEGOTIATE_128
- 1: NTLMSSP_NEGOTIATE_KEY_EXCH
- 0: NTLMSSP_NEGOTIATE_56
- DomainNameLen : 0x0000 (0)
- DomainNameMaxLen : 0x0000 (0)
- DomainName : *
- DomainName : ''
- WorkstationLen : 0x0000 (0)
- WorkstationMaxLen : 0x0000 (0)
- Workstation : *
- Workstation : ''
- Version: struct ntlmssp_VERSION
- ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
- ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
- ProductBuild : 0x0000 (0)
- Reserved: ARRAY(3)
- [0] : 0x00 (0)
- [1] : 0x00 (0)
- [2] : 0x00 (0)
- NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
- gensec_update_send: ntlmssp[0x7fcb8c01ec90]: subreq: 0x7fcb8c018930
- gensec_update_send: spnego[0x7fcb8c016e60]: subreq: 0x7fcb8c023040
- gensec_update_done: ntlmssp[0x7fcb8c01ec90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7fcb8c018930/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x7fcb8c018af0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215]
- gensec_update_done: spnego[0x7fcb8c016e60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7fcb8c023040/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7fcb8c023200)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
- Got challenge flags:
- Got NTLMSSP neg_flags=0x628a8215
- NTLMSSP_NEGOTIATE_UNICODE
- NTLMSSP_REQUEST_TARGET
- NTLMSSP_NEGOTIATE_SIGN
- NTLMSSP_NEGOTIATE_NTLM
- NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- NTLMSSP_TARGET_TYPE_SERVER
- NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- NTLMSSP_NEGOTIATE_TARGET_INFO
- NTLMSSP_NEGOTIATE_VERSION
- NTLMSSP_NEGOTIATE_128
- NTLMSSP_NEGOTIATE_KEY_EXCH
- challenge: struct CHALLENGE_MESSAGE
- Signature : 'NTLMSSP'
- MessageType : NtLmChallenge (0x2)
- TargetNameLen : 0x000c (12)
- TargetNameMaxLen : 0x000c (12)
- TargetName : *
- TargetName : 'LANBOX'
- NegotiateFlags : 0x628a8215 (1653244437)
- 1: NTLMSSP_NEGOTIATE_UNICODE
- 0: NTLMSSP_NEGOTIATE_OEM
- 1: NTLMSSP_REQUEST_TARGET
- 1: NTLMSSP_NEGOTIATE_SIGN
- 0: NTLMSSP_NEGOTIATE_SEAL
- 0: NTLMSSP_NEGOTIATE_DATAGRAM
- 0: NTLMSSP_NEGOTIATE_LM_KEY
- 0: NTLMSSP_NEGOTIATE_NETWARE
- 1: NTLMSSP_NEGOTIATE_NTLM
- 0: NTLMSSP_NEGOTIATE_NT_ONLY
- 0: NTLMSSP_ANONYMOUS
- 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
- 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- 0: NTLMSSP_TARGET_TYPE_DOMAIN
- 1: NTLMSSP_TARGET_TYPE_SERVER
- 0: NTLMSSP_TARGET_TYPE_SHARE
- 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- 0: NTLMSSP_NEGOTIATE_IDENTIFY
- 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
- 1: NTLMSSP_NEGOTIATE_TARGET_INFO
- 1: NTLMSSP_NEGOTIATE_VERSION
- 1: NTLMSSP_NEGOTIATE_128
- 1: NTLMSSP_NEGOTIATE_KEY_EXCH
- 0: NTLMSSP_NEGOTIATE_56
- ServerChallenge : d68c3cbc58b462b5
- Reserved : 0000000000000000
- TargetInfoLen : 0x006a (106)
- TargetInfoMaxLen : 0x006a (106)
- TargetInfo : *
- TargetInfo: struct AV_PAIR_LIST
- count : 0x00000006 (6)
- pair: ARRAY(6)
- pair: struct AV_PAIR
- AvId : MsvAvNbDomainName (0x2)
- AvLen : 0x000c (12)
- Value : union ntlmssp_AvValue(case 0x2)
- AvNbDomainName : 'LANBOX'
- pair: struct AV_PAIR
- AvId : MsvAvNbComputerName (0x1)
- AvLen : 0x000c (12)
- Value : union ntlmssp_AvValue(case 0x1)
- AvNbComputerName : 'LANBOX'
- pair: struct AV_PAIR
- AvId : MsvAvDnsDomainName (0x4)
- AvLen : 0x0012 (18)
- Value : union ntlmssp_AvValue(case 0x4)
- AvDnsDomainName : 'local.lan'
- pair: struct AV_PAIR
- AvId : MsvAvDnsComputerName (0x3)
- AvLen : 0x0020 (32)
- Value : union ntlmssp_AvValue(case 0x3)
- AvDnsComputerName : 'lanbox.local.lan'
- pair: struct AV_PAIR
- AvId : MsvAvTimestamp (0x7)
- AvLen : 0x0008 (8)
- Value : union ntlmssp_AvValue(case 0x7)
- AvTimestamp : Wed May 4 04:27:04 AM 2022 CST
- pair: struct AV_PAIR
- AvId : MsvAvEOL (0x0)
- AvLen : 0x0000 (0)
- Value : union ntlmssp_AvValue(case 0x0)
- Version: struct ntlmssp_VERSION
- ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6)
- ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1)
- ProductBuild : 0x0000 (0)
- Reserved : 000000
- NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF)
- authenticate: struct AUTHENTICATE_MESSAGE
- Signature : 'NTLMSSP'
- MessageType : NtLmAuthenticate (3)
- LmChallengeResponseLen : 0x0000 (0)
- LmChallengeResponseMaxLen: 0x0000 (0)
- LmChallengeResponse : *
- LmChallengeResponse : union ntlmssp_LM_RESPONSE_with_len(case 0)
- NtChallengeResponseLen : 0x0000 (0)
- NtChallengeResponseMaxLen: 0x0000 (0)
- NtChallengeResponse : *
- NtChallengeResponse : union ntlmssp_NTLM_RESPONSE_with_len(case 0)
- DomainNameLen : 0x0000 (0)
- DomainNameMaxLen : 0x0000 (0)
- DomainName : *
- DomainName : ''
- UserNameLen : 0x0000 (0)
- UserNameMaxLen : 0x0000 (0)
- UserName : *
- UserName : ''
- WorkstationLen : 0x0000 (0)
- WorkstationMaxLen : 0x0000 (0)
- Workstation : *
- Workstation : ''
- EncryptedRandomSessionKeyLen: 0x0010 (16)
- EncryptedRandomSessionKeyMaxLen: 0x0010 (16)
- EncryptedRandomSessionKey: *
- EncryptedRandomSessionKey: DATA_BLOB length=16
- [0000] D9 99 A0 EC 23 C4 1D BB 62 63 B5 EB 93 62 15 61 ....#... bc...b.a
- NegotiateFlags : 0x62008a15 (1644202517)
- 1: NTLMSSP_NEGOTIATE_UNICODE
- 0: NTLMSSP_NEGOTIATE_OEM
- 1: NTLMSSP_REQUEST_TARGET
- 1: NTLMSSP_NEGOTIATE_SIGN
- 0: NTLMSSP_NEGOTIATE_SEAL
- 0: NTLMSSP_NEGOTIATE_DATAGRAM
- 0: NTLMSSP_NEGOTIATE_LM_KEY
- 0: NTLMSSP_NEGOTIATE_NETWARE
- 1: NTLMSSP_NEGOTIATE_NTLM
- 0: NTLMSSP_NEGOTIATE_NT_ONLY
- 1: NTLMSSP_ANONYMOUS
- 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
- 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- 0: NTLMSSP_TARGET_TYPE_DOMAIN
- 0: NTLMSSP_TARGET_TYPE_SERVER
- 0: NTLMSSP_TARGET_TYPE_SHARE
- 0: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- 0: NTLMSSP_NEGOTIATE_IDENTIFY
- 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
- 0: NTLMSSP_NEGOTIATE_TARGET_INFO
- 1: NTLMSSP_NEGOTIATE_VERSION
- 1: NTLMSSP_NEGOTIATE_128
- 1: NTLMSSP_NEGOTIATE_KEY_EXCH
- 0: NTLMSSP_NEGOTIATE_56
- Version: struct ntlmssp_VERSION
- ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
- ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
- ProductBuild : 0x0000 (0)
- Reserved: ARRAY(3)
- [0] : 0x00 (0)
- [1] : 0x00 (0)
- [2] : 0x00 (0)
- NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
- NTLMSSP: Set final flags:
- Got NTLMSSP neg_flags=0x62008a15
- NTLMSSP_NEGOTIATE_UNICODE
- NTLMSSP_REQUEST_TARGET
- NTLMSSP_NEGOTIATE_SIGN
- NTLMSSP_NEGOTIATE_NTLM
- NTLMSSP_ANONYMOUS
- NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- NTLMSSP_NEGOTIATE_VERSION
- NTLMSSP_NEGOTIATE_128
- NTLMSSP_NEGOTIATE_KEY_EXCH
- NTLMSSP Sign/Seal - Initialising with flags:
- Got NTLMSSP neg_flags=0x62008a15
- NTLMSSP_NEGOTIATE_UNICODE
- NTLMSSP_REQUEST_TARGET
- NTLMSSP_NEGOTIATE_SIGN
- NTLMSSP_NEGOTIATE_NTLM
- NTLMSSP_ANONYMOUS
- NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- NTLMSSP_NEGOTIATE_VERSION
- NTLMSSP_NEGOTIATE_128
- NTLMSSP_NEGOTIATE_KEY_EXCH
- NTLMSSP Sign/Seal - using NTLM1
- dump_arc4_state: NTLMv1 arc4 state:
- gensec_update_send: ntlmssp[0x7fcb8c01ec90]: subreq: 0x7fcb8c0050f0
- gensec_update_send: spnego[0x7fcb8c016e60]: subreq: 0x7fcb8c037720
- gensec_update_done: ntlmssp[0x7fcb8c01ec90]: NT_STATUS_OK tevent_req[0x7fcb8c0050f0/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x7fcb8c0052b0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:222]
- gensec_update_done: spnego[0x7fcb8c016e60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7fcb8c037720/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7fcb8c0378e0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
- NTLMSSP Sign/Seal - Initialising with flags:
- Got NTLMSSP neg_flags=0x62008a15
- NTLMSSP_NEGOTIATE_UNICODE
- NTLMSSP_REQUEST_TARGET
- NTLMSSP_NEGOTIATE_SIGN
- NTLMSSP_NEGOTIATE_NTLM
- NTLMSSP_ANONYMOUS
- NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- NTLMSSP_NEGOTIATE_VERSION
- NTLMSSP_NEGOTIATE_128
- NTLMSSP_NEGOTIATE_KEY_EXCH
- NTLMSSP Sign/Seal - using NTLM1
- dump_arc4_state: NTLMv1 arc4 state:
- gensec_update_send: spnego[0x7fcb8c016e60]: subreq: 0x7fcb8c037720
- gensec_update_done: spnego[0x7fcb8c016e60]: NT_STATUS_OK tevent_req[0x7fcb8c037720/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7fcb8c0378e0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
- session setup ok
- map_errno_from_nt_status: 32 bit codes: code=c0000022
- smb-network: do_mount - [smb://192.168.0.100; 0] dir = (nil), cancelled = 0, errno = [13] 'Permission denied'
- smb-network: purging server cache
- smb-network: do_mount - after anon, enabling NTLMSSP fallback
- smb-network: do_mount - try #1
- parsed path: fname='smb://192.168.0.100' server='192.168.0.100' share='' path='' options=''
- SMBC_check_options(): server='192.168.0.100' share='' path='' options=''
- smb-network: looking up cached server '192.168.0.100'\'IPC$', user 'SAMBA';'jason'
- smb-network: returning (nil)
- smb-network: auth_callback - normal pass
- smb-network: auth_callback - reusing keyring credentials: user = 'darkstar', domain = 'WORKGROUP'
- smb-network: auth_callback - out: last_user = 'darkstar', last_domain = 'WORKGROUP'
- smb-network: looking up cached server '192.168.0.100'\'IPC$', user 'WORKGROUP';'darkstar'
- smb-network: returning (nil)
- smb-network: looking up cached server '192.168.0.100'\'IPC$', user 'WORKGROUP';'darkstar'
- smb-network: returning (nil)
- SMBC_server: server_n=[192.168.0.100] server=[192.168.0.100]
- -> server_n=[192.168.0.100] server=[192.168.0.100]
- Connecting to 192.168.0.100 at port 139
- socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=87040, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
- cli_session_setup_spnego_send: Connect to 192.168.0.100 as darkstar@WORKGROUP using SPNEGO
- Starting GENSEC mechanism spnego
- Starting GENSEC submechanism gse_krb5
- Cannot do GSE to an IP address
- Failed to start GENSEC client mech gse_krb5: NT_STATUS_INVALID_PARAMETER
- Starting GENSEC submechanism ntlmssp
- negotiate: struct NEGOTIATE_MESSAGE
- Signature : 'NTLMSSP'
- MessageType : NtLmNegotiate (1)
- NegotiateFlags : 0x62088215 (1644724757)
- 1: NTLMSSP_NEGOTIATE_UNICODE
- 0: NTLMSSP_NEGOTIATE_OEM
- 1: NTLMSSP_REQUEST_TARGET
- 1: NTLMSSP_NEGOTIATE_SIGN
- 0: NTLMSSP_NEGOTIATE_SEAL
- 0: NTLMSSP_NEGOTIATE_DATAGRAM
- 0: NTLMSSP_NEGOTIATE_LM_KEY
- 0: NTLMSSP_NEGOTIATE_NETWARE
- 1: NTLMSSP_NEGOTIATE_NTLM
- 0: NTLMSSP_NEGOTIATE_NT_ONLY
- 0: NTLMSSP_ANONYMOUS
- 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
- 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- 0: NTLMSSP_TARGET_TYPE_DOMAIN
- 0: NTLMSSP_TARGET_TYPE_SERVER
- 0: NTLMSSP_TARGET_TYPE_SHARE
- 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- 0: NTLMSSP_NEGOTIATE_IDENTIFY
- 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
- 0: NTLMSSP_NEGOTIATE_TARGET_INFO
- 1: NTLMSSP_NEGOTIATE_VERSION
- 1: NTLMSSP_NEGOTIATE_128
- 1: NTLMSSP_NEGOTIATE_KEY_EXCH
- 0: NTLMSSP_NEGOTIATE_56
- DomainNameLen : 0x0000 (0)
- DomainNameMaxLen : 0x0000 (0)
- DomainName : *
- DomainName : ''
- WorkstationLen : 0x0000 (0)
- WorkstationMaxLen : 0x0000 (0)
- Workstation : *
- Workstation : ''
- Version: struct ntlmssp_VERSION
- ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
- ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
- ProductBuild : 0x0000 (0)
- Reserved: ARRAY(3)
- [0] : 0x00 (0)
- [1] : 0x00 (0)
- [2] : 0x00 (0)
- NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
- gensec_update_send: ntlmssp[0x7fcb8c040490]: subreq: 0x7fcb8c018930
- gensec_update_send: spnego[0x7fcb8c016e60]: subreq: 0x7fcb8c042e40
- gensec_update_done: ntlmssp[0x7fcb8c040490]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7fcb8c018930/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x7fcb8c018af0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215]
- gensec_update_done: spnego[0x7fcb8c016e60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7fcb8c042e40/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7fcb8c043000)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
- Got challenge flags:
- Got NTLMSSP neg_flags=0x628a8215
- NTLMSSP_NEGOTIATE_UNICODE
- NTLMSSP_REQUEST_TARGET
- NTLMSSP_NEGOTIATE_SIGN
- NTLMSSP_NEGOTIATE_NTLM
- NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- NTLMSSP_TARGET_TYPE_SERVER
- NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- NTLMSSP_NEGOTIATE_TARGET_INFO
- NTLMSSP_NEGOTIATE_VERSION
- NTLMSSP_NEGOTIATE_128
- NTLMSSP_NEGOTIATE_KEY_EXCH
- challenge: struct CHALLENGE_MESSAGE
- Signature : 'NTLMSSP'
- MessageType : NtLmChallenge (0x2)
- TargetNameLen : 0x000c (12)
- TargetNameMaxLen : 0x000c (12)
- TargetName : *
- TargetName : 'LANBOX'
- NegotiateFlags : 0x628a8215 (1653244437)
- 1: NTLMSSP_NEGOTIATE_UNICODE
- 0: NTLMSSP_NEGOTIATE_OEM
- 1: NTLMSSP_REQUEST_TARGET
- 1: NTLMSSP_NEGOTIATE_SIGN
- 0: NTLMSSP_NEGOTIATE_SEAL
- 0: NTLMSSP_NEGOTIATE_DATAGRAM
- 0: NTLMSSP_NEGOTIATE_LM_KEY
- 0: NTLMSSP_NEGOTIATE_NETWARE
- 1: NTLMSSP_NEGOTIATE_NTLM
- 0: NTLMSSP_NEGOTIATE_NT_ONLY
- 0: NTLMSSP_ANONYMOUS
- 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
- 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- 0: NTLMSSP_TARGET_TYPE_DOMAIN
- 1: NTLMSSP_TARGET_TYPE_SERVER
- 0: NTLMSSP_TARGET_TYPE_SHARE
- 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- 0: NTLMSSP_NEGOTIATE_IDENTIFY
- 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
- 1: NTLMSSP_NEGOTIATE_TARGET_INFO
- 1: NTLMSSP_NEGOTIATE_VERSION
- 1: NTLMSSP_NEGOTIATE_128
- 1: NTLMSSP_NEGOTIATE_KEY_EXCH
- 0: NTLMSSP_NEGOTIATE_56
- ServerChallenge : 6b3873603e141c16
- Reserved : 0000000000000000
- TargetInfoLen : 0x006a (106)
- TargetInfoMaxLen : 0x006a (106)
- TargetInfo : *
- TargetInfo: struct AV_PAIR_LIST
- count : 0x00000006 (6)
- pair: ARRAY(6)
- pair: struct AV_PAIR
- AvId : MsvAvNbDomainName (0x2)
- AvLen : 0x000c (12)
- Value : union ntlmssp_AvValue(case 0x2)
- AvNbDomainName : 'LANBOX'
- pair: struct AV_PAIR
- AvId : MsvAvNbComputerName (0x1)
- AvLen : 0x000c (12)
- Value : union ntlmssp_AvValue(case 0x1)
- AvNbComputerName : 'LANBOX'
- pair: struct AV_PAIR
- AvId : MsvAvDnsDomainName (0x4)
- AvLen : 0x0012 (18)
- Value : union ntlmssp_AvValue(case 0x4)
- AvDnsDomainName : 'local.lan'
- pair: struct AV_PAIR
- AvId : MsvAvDnsComputerName (0x3)
- AvLen : 0x0020 (32)
- Value : union ntlmssp_AvValue(case 0x3)
- AvDnsComputerName : 'lanbox.local.lan'
- pair: struct AV_PAIR
- AvId : MsvAvTimestamp (0x7)
- AvLen : 0x0008 (8)
- Value : union ntlmssp_AvValue(case 0x7)
- AvTimestamp : Wed May 4 04:27:04 AM 2022 CST
- pair: struct AV_PAIR
- AvId : MsvAvEOL (0x0)
- AvLen : 0x0000 (0)
- Value : union ntlmssp_AvValue(case 0x0)
- Version: struct ntlmssp_VERSION
- ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6)
- ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1)
- ProductBuild : 0x0000 (0)
- Reserved : 000000
- NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF)
- authenticate: struct AUTHENTICATE_MESSAGE
- Signature : 'NTLMSSP'
- MessageType : NtLmAuthenticate (3)
- LmChallengeResponseLen : 0x0018 (24)
- LmChallengeResponseMaxLen: 0x0018 (24)
- LmChallengeResponse : *
- LmChallengeResponse : union ntlmssp_LM_RESPONSE_with_len(case 24)
- v1: struct LM_RESPONSE
- Response : 000000000000000000000000000000000000000000000000
- NtChallengeResponseLen : 0x010e (270)
- NtChallengeResponseMaxLen: 0x010e (270)
- NtChallengeResponse : *
- NtChallengeResponse : union ntlmssp_NTLM_RESPONSE_with_len(case 270)
- v2: struct NTLMv2_RESPONSE
- Response : c45d11e38bf2149c8a94357cbf32d427
- Challenge: struct NTLMv2_CLIENT_CHALLENGE
- RespType : 0x01 (1)
- HiRespType : 0x01 (1)
- Reserved1 : 0x0000 (0)
- Reserved2 : 0x00000000 (0)
- TimeStamp : Wed May 4 04:27:04 AM 2022 CST
- ChallengeFromClient : abd7046e10e56eaa
- Reserved3 : 0x00000000 (0)
- AvPairs: struct AV_PAIR_LIST
- count : 0x0000000a (10)
- pair: ARRAY(10)
- pair: struct AV_PAIR
- AvId : MsvAvNbDomainName (0x2)
- AvLen : 0x000c (12)
- Value : union ntlmssp_AvValue(case 0x2)
- AvNbDomainName : 'LANBOX'
- pair: struct AV_PAIR
- AvId : MsvAvNbComputerName (0x1)
- AvLen : 0x000c (12)
- Value : union ntlmssp_AvValue(case 0x1)
- AvNbComputerName : 'LANBOX'
- pair: struct AV_PAIR
- AvId : MsvAvDnsDomainName (0x4)
- AvLen : 0x0012 (18)
- Value : union ntlmssp_AvValue(case 0x4)
- AvDnsDomainName : 'local.lan'
- pair: struct AV_PAIR
- AvId : MsvAvDnsComputerName (0x3)
- AvLen : 0x0020 (32)
- Value : union ntlmssp_AvValue(case 0x3)
- AvDnsComputerName : 'lanbox.local.lan'
- pair: struct AV_PAIR
- AvId : MsvAvTimestamp (0x7)
- AvLen : 0x0008 (8)
- Value : union ntlmssp_AvValue(case 0x7)
- AvTimestamp : Wed May 4 04:27:04 AM 2022 CST
- pair: struct AV_PAIR
- AvId : MsvAvFlags (0x6)
- AvLen : 0x0004 (4)
- Value : union ntlmssp_AvValue(case 0x6)
- AvFlags : 0x00000002 (2)
- 0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT
- 1: NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE
- 0: NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE
- pair: struct AV_PAIR
- AvId : MsvAvSingleHost (0x8)
- AvLen : 0x0030 (48)
- Value : union ntlmssp_AvValue(case 0x8)
- AvSingleHost: struct ntlmssp_SingleHostData
- Size : 0x00000030 (48)
- Z4 : 0x00000000 (0)
- token_info: struct LSAP_TOKEN_INFO_INTEGRITY
- Flags : 0x00000000 (0)
- TokenIL : 0x00000000 (0)
- MachineId : 5c37563dacd89f9fb424b533639b1a5f76134dc61580117043c3c2ce69657461
- remaining : DATA_BLOB length=0
- pair: struct AV_PAIR
- AvId : MsvChannelBindings (0xA)
- AvLen : 0x0010 (16)
- Value : union ntlmssp_AvValue(case 0xA)
- ChannelBindings : 00000000000000000000000000000000
- pair: struct AV_PAIR
- AvId : MsvAvTargetName (0x9)
- AvLen : 0x0024 (36)
- Value : union ntlmssp_AvValue(case 0x9)
- AvTargetName : 'cifs/192.168.0.100'
- pair: struct AV_PAIR
- AvId : MsvAvEOL (0x0)
- AvLen : 0x0000 (0)
- Value : union ntlmssp_AvValue(case 0x0)
- DomainNameLen : 0x0012 (18)
- DomainNameMaxLen : 0x0012 (18)
- DomainName : *
- DomainName : 'WORKGROUP'
- UserNameLen : 0x0010 (16)
- UserNameMaxLen : 0x0010 (16)
- UserName : *
- UserName : 'darkstar'
- WorkstationLen : 0x0008 (8)
- WorkstationMaxLen : 0x0008 (8)
- Workstation : *
- Workstation : 'HOST'
- EncryptedRandomSessionKeyLen: 0x0010 (16)
- EncryptedRandomSessionKeyMaxLen: 0x0010 (16)
- EncryptedRandomSessionKey: *
- EncryptedRandomSessionKey: DATA_BLOB length=16
- [0000] 1A 4B FD FE BE 65 7F 1D 95 BF 08 39 AF B6 88 36 .K...e.. ...9...6
- NegotiateFlags : 0x62088215 (1644724757)
- 1: NTLMSSP_NEGOTIATE_UNICODE
- 0: NTLMSSP_NEGOTIATE_OEM
- 1: NTLMSSP_REQUEST_TARGET
- 1: NTLMSSP_NEGOTIATE_SIGN
- 0: NTLMSSP_NEGOTIATE_SEAL
- 0: NTLMSSP_NEGOTIATE_DATAGRAM
- 0: NTLMSSP_NEGOTIATE_LM_KEY
- 0: NTLMSSP_NEGOTIATE_NETWARE
- 1: NTLMSSP_NEGOTIATE_NTLM
- 0: NTLMSSP_NEGOTIATE_NT_ONLY
- 0: NTLMSSP_ANONYMOUS
- 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
- 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- 0: NTLMSSP_TARGET_TYPE_DOMAIN
- 0: NTLMSSP_TARGET_TYPE_SERVER
- 0: NTLMSSP_TARGET_TYPE_SHARE
- 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- 0: NTLMSSP_NEGOTIATE_IDENTIFY
- 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
- 0: NTLMSSP_NEGOTIATE_TARGET_INFO
- 1: NTLMSSP_NEGOTIATE_VERSION
- 1: NTLMSSP_NEGOTIATE_128
- 1: NTLMSSP_NEGOTIATE_KEY_EXCH
- 0: NTLMSSP_NEGOTIATE_56
- Version: struct ntlmssp_VERSION
- ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
- ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
- ProductBuild : 0x0000 (0)
- Reserved: ARRAY(3)
- [0] : 0x00 (0)
- [1] : 0x00 (0)
- [2] : 0x00 (0)
- NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
- NTLMSSP: Set final flags:
- Got NTLMSSP neg_flags=0x62088215
- NTLMSSP_NEGOTIATE_UNICODE
- NTLMSSP_REQUEST_TARGET
- NTLMSSP_NEGOTIATE_SIGN
- NTLMSSP_NEGOTIATE_NTLM
- NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- NTLMSSP_NEGOTIATE_VERSION
- NTLMSSP_NEGOTIATE_128
- NTLMSSP_NEGOTIATE_KEY_EXCH
- NTLMSSP Sign/Seal - Initialising with flags:
- Got NTLMSSP neg_flags=0x62088215
- NTLMSSP_NEGOTIATE_UNICODE
- NTLMSSP_REQUEST_TARGET
- NTLMSSP_NEGOTIATE_SIGN
- NTLMSSP_NEGOTIATE_NTLM
- NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- NTLMSSP_NEGOTIATE_VERSION
- NTLMSSP_NEGOTIATE_128
- NTLMSSP_NEGOTIATE_KEY_EXCH
- dump_arc4_state: NTLMSSP send seal arc4 state:
- dump_arc4_state: NTLMSSP recv seal arc4 state:
- gensec_update_send: ntlmssp[0x7fcb8c040490]: subreq: 0x7fcb8c0050f0
- gensec_update_send: spnego[0x7fcb8c016e60]: subreq: 0x7fcb8c042e40
- gensec_update_done: ntlmssp[0x7fcb8c040490]: NT_STATUS_OK tevent_req[0x7fcb8c0050f0/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x7fcb8c0052b0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:222]
- gensec_update_done: spnego[0x7fcb8c016e60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7fcb8c042e40/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7fcb8c043000)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
- ntlmssp_check_packet: NTLMSSP signature OK !
- NTLMSSP Sign/Seal - Initialising with flags:
- Got NTLMSSP neg_flags=0x62088215
- NTLMSSP_NEGOTIATE_UNICODE
- NTLMSSP_REQUEST_TARGET
- NTLMSSP_NEGOTIATE_SIGN
- NTLMSSP_NEGOTIATE_NTLM
- NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- NTLMSSP_NEGOTIATE_VERSION
- NTLMSSP_NEGOTIATE_128
- NTLMSSP_NEGOTIATE_KEY_EXCH
- dump_arc4_state: NTLMSSP send seal arc4 state:
- dump_arc4_state: NTLMSSP recv seal arc4 state:
- gensec_update_send: spnego[0x7fcb8c016e60]: subreq: 0x7fcb8c042e40
- gensec_update_done: spnego[0x7fcb8c016e60]: NT_STATUS_OK tevent_req[0x7fcb8c042e40/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7fcb8c043000)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
- session setup ok
- signed SMB2 message (sign_algo_id=1)
- tconx ok
- IPC$ so ignore case sensitivity
- smb-network: adding cached server '192.168.0.100'\'IPC$', user 'WORKGROUP';'darkstar' with data 0x7fcb8c042890
- Server connect ok: //192.168.0.100/IPC$: 0x7fcb8c042890
- Bind RPC Pipe: host 192.168.0.100 auth_type 0, auth_level 1
- &r: struct ncacn_packet
- rpc_vers : 0x05 (5)
- rpc_vers_minor : 0x00 (0)
- ptype : DCERPC_PKT_BIND (11)
- pfc_flags : 0x03 (3)
- 1: DCERPC_PFC_FLAG_FIRST
- 1: DCERPC_PFC_FLAG_LAST
- 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
- 0: DCERPC_PFC_FLAG_CONC_MPX
- 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
- 0: DCERPC_PFC_FLAG_MAYBE
- 0: DCERPC_PFC_FLAG_OBJECT_UUID
- drep: ARRAY(4)
- [0] : 0x10 (16)
- [1] : 0x00 (0)
- [2] : 0x00 (0)
- [3] : 0x00 (0)
- frag_length : 0x0048 (72)
- auth_length : 0x0000 (0)
- call_id : 0x00000001 (1)
- u : union dcerpc_payload(case 11)
- bind: struct dcerpc_bind
- max_xmit_frag : 0x10b8 (4280)
- max_recv_frag : 0x10b8 (4280)
- assoc_group_id : 0x00000000 (0)
- num_contexts : 0x01 (1)
- ctx_list: ARRAY(1)
- ctx_list: struct dcerpc_ctx_list
- context_id : 0x0000 (0)
- num_transfer_syntaxes : 0x01 (1)
- abstract_syntax: struct ndr_syntax_id
- uuid : 4b324fc8-1670-01d3-1278-5a47bf6ee188
- if_version : 0x00000003 (3)
- transfer_syntaxes: ARRAY(1)
- transfer_syntaxes: struct ndr_syntax_id
- uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860
- if_version : 0x00000002 (2)
- auth_info : DATA_BLOB length=0
- rpc_api_pipe: host 192.168.0.100
- rpc_read_send: data_to_read: 52
- state->pkt: struct ncacn_packet
- rpc_vers : 0x05 (5)
- rpc_vers_minor : 0x00 (0)
- ptype : DCERPC_PKT_BIND_ACK (12)
- pfc_flags : 0x03 (3)
- 1: DCERPC_PFC_FLAG_FIRST
- 1: DCERPC_PFC_FLAG_LAST
- 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
- 0: DCERPC_PFC_FLAG_CONC_MPX
- 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
- 0: DCERPC_PFC_FLAG_MAYBE
- 0: DCERPC_PFC_FLAG_OBJECT_UUID
- drep: ARRAY(4)
- [0] : 0x10 (16)
- [1] : 0x00 (0)
- [2] : 0x00 (0)
- [3] : 0x00 (0)
- frag_length : 0x0044 (68)
- auth_length : 0x0000 (0)
- call_id : 0x00000001 (1)
- u : union dcerpc_payload(case 12)
- bind_ack: struct dcerpc_bind_ack
- max_xmit_frag : 0x10b8 (4280)
- max_recv_frag : 0x10b8 (4280)
- assoc_group_id : 0x000053f0 (21488)
- secondary_address_size : 0x000d (13)
- secondary_address : '\pipe\srvsvc'
- _pad1 : DATA_BLOB length=1
- [0000] 00 .
- num_results : 0x01 (1)
- ctx_list: ARRAY(1)
- ctx_list: struct dcerpc_ack_ctx
- result : DCERPC_BIND_ACK_RESULT_ACCEPTANCE (0)
- reason : union dcerpc_bind_ack_reason(case 0)
- value : DCERPC_BIND_ACK_REASON_NOT_SPECIFIED (0)
- syntax: struct ndr_syntax_id
- uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860
- if_version : 0x00000002 (2)
- auth_info : DATA_BLOB length=0
- rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK
- rpc_api_pipe: host 192.168.0.100 returned 68 bytes.
- check_bind_response: accepted!
- cli_rpc_pipe_open_noauth: opened pipe srvsvc to machine 192.168.0.100 and bound anonymously.
- srvsvc_NetShareEnumAll: struct srvsvc_NetShareEnumAll
- in: struct srvsvc_NetShareEnumAll
- server_unc : *
- server_unc : '192.168.0.100'
- info_ctr : *
- info_ctr: struct srvsvc_NetShareInfoCtr
- level : 0x00000001 (1)
- ctr : union srvsvc_NetShareCtr(case 1)
- ctr1 : *
- ctr1: struct srvsvc_NetShareCtr1
- count : 0x00000000 (0)
- array : NULL
- max_buffer : 0xffffffff (4294967295)
- resume_handle : *
- resume_handle : 0x00000000 (0)
- &r: struct ncacn_packet
- rpc_vers : 0x05 (5)
- rpc_vers_minor : 0x00 (0)
- ptype : DCERPC_PKT_REQUEST (0)
- pfc_flags : 0x03 (3)
- 1: DCERPC_PFC_FLAG_FIRST
- 1: DCERPC_PFC_FLAG_LAST
- 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
- 0: DCERPC_PFC_FLAG_CONC_MPX
- 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
- 0: DCERPC_PFC_FLAG_MAYBE
- 0: DCERPC_PFC_FLAG_OBJECT_UUID
- drep: ARRAY(4)
- [0] : 0x10 (16)
- [1] : 0x00 (0)
- [2] : 0x00 (0)
- [3] : 0x00 (0)
- frag_length : 0x0018 (24)
- auth_length : 0x0000 (0)
- call_id : 0x00000002 (2)
- u : union dcerpc_payload(case 0)
- request: struct dcerpc_request
- alloc_hint : 0x0000004c (76)
- context_id : 0x0000 (0)
- opnum : 0x000f (15)
- object : union dcerpc_object(case 0)
- empty: struct dcerpc_empty
- stub_and_verifier : DATA_BLOB length=0
- rpc_api_pipe: host 192.168.0.100
- rpc_read_send: data_to_read: 876
- state->pkt: struct ncacn_packet
- rpc_vers : 0x05 (5)
- rpc_vers_minor : 0x00 (0)
- ptype : DCERPC_PKT_RESPONSE (2)
- pfc_flags : 0x03 (3)
- 1: DCERPC_PFC_FLAG_FIRST
- 1: DCERPC_PFC_FLAG_LAST
- 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
- 0: DCERPC_PFC_FLAG_CONC_MPX
- 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
- 0: DCERPC_PFC_FLAG_MAYBE
- 0: DCERPC_PFC_FLAG_OBJECT_UUID
- drep: ARRAY(4)
- [0] : 0x10 (16)
- [1] : 0x00 (0)
- [2] : 0x00 (0)
- [3] : 0x00 (0)
- frag_length : 0x037c (892)
- auth_length : 0x0000 (0)
- call_id : 0x00000002 (2)
- u : union dcerpc_payload(case 2)
- response: struct dcerpc_response
- alloc_hint : 0x00000364 (868)
- context_id : 0x0000 (0)
- cancel_count : 0x00 (0)
- reserved : 0x00 (0)
- stub_and_verifier : DATA_BLOB length=868
- [0000] 01 00 00 00 01 00 00 00 0C 00 02 00 0B 00 00 00 ........ ........
- [0010] 10 00 02 00 0B 00 00 00 14 00 02 00 03 00 00 80 ........ ........
- [0020] 18 00 02 00 1C 00 02 00 00 00 00 00 20 00 02 00 ........ .... ...
- [0030] 24 00 02 00 00 00 00 00 28 00 02 00 2C 00 02 00 $....... (...,...
- [0040] 00 00 00 00 30 00 02 00 34 00 02 00 00 00 00 00 ....0... 4.......
- [0050] 38 00 02 00 3C 00 02 00 00 00 00 00 40 00 02 00 8...<... ....@...
- [0060] 44 00 02 00 00 00 00 00 48 00 02 00 4C 00 02 00 D....... H...L...
- [0070] 00 00 00 00 50 00 02 00 54 00 02 00 00 00 00 00 ....P... T.......
- [0080] 58 00 02 00 5C 00 02 00 00 00 00 00 60 00 02 00 X...\... ....`...
- [0090] 64 00 02 00 00 00 00 00 68 00 02 00 05 00 00 00 d....... h.......
- [00A0] 00 00 00 00 05 00 00 00 49 00 50 00 43 00 24 00 ........ I.P.C.$.
- [00B0] 00 00 00 00 1D 00 00 00 00 00 00 00 1D 00 00 00 ........ ........
- [00C0] 49 00 50 00 43 00 20 00 53 00 65 00 72 00 76 00 I.P.C. . S.e.r.v.
- [00D0] 69 00 63 00 65 00 20 00 28 00 54 00 72 00 75 00 i.c.e. . (.T.r.u.
- [00E0] 65 00 4E 00 41 00 53 00 20 00 53 00 65 00 72 00 e.N.A.S. .S.e.r.
- [00F0] 76 00 65 00 72 00 29 00 00 00 00 00 07 00 00 00 v.e.r.). ........
- [0100] 00 00 00 00 07 00 00 00 43 00 6F 00 6D 00 69 00 ........ C.o.m.i.
- [0110] 63 00 73 00 00 00 00 00 07 00 00 00 00 00 00 00 c.s..... ........
- [0120] 07 00 00 00 43 00 6F 00 6D 00 69 00 63 00 73 00 ....C.o. m.i.c.s.
- [0130] 00 00 00 00 0E 00 00 00 00 00 00 00 0E 00 00 00 ........ ........
- [0140] 44 00 6F 00 63 00 75 00 6D 00 65 00 6E 00 74 00 D.o.c.u. m.e.n.t.
- [0150] 61 00 72 00 69 00 65 00 73 00 00 00 0E 00 00 00 a.r.i.e. s.......
- [0160] 00 00 00 00 0E 00 00 00 44 00 6F 00 63 00 75 00 ........ D.o.c.u.
- [0170] 6D 00 65 00 6E 00 74 00 61 00 72 00 69 00 65 00 m.e.n.t. a.r.i.e.
- [0180] 73 00 00 00 03 00 00 00 00 00 00 00 03 00 00 00 s....... ........
- [0190] 54 00 56 00 00 00 00 00 03 00 00 00 00 00 00 00 T.V..... ........
- [01A0] 03 00 00 00 54 00 56 00 00 00 00 00 0A 00 00 00 ....T.V. ........
- [01B0] 00 00 00 00 0A 00 00 00 4C 00 69 00 6E 00 75 00 ........ L.i.n.u.
- [01C0] 78 00 20 00 49 00 53 00 4F 00 00 00 0A 00 00 00 x. .I.S. O.......
- [01D0] 00 00 00 00 0A 00 00 00 4C 00 69 00 6E 00 75 00 ........ L.i.n.u.
- [01E0] 78 00 20 00 49 00 53 00 4F 00 00 00 0A 00 00 00 x. .I.S. O.......
- [01F0] 00 00 00 00 0A 00 00 00 44 00 6F 00 77 00 6E 00 ........ D.o.w.n.
- [0200] 6C 00 6F 00 61 00 64 00 73 00 00 00 0A 00 00 00 l.o.a.d. s.......
- [0210] 00 00 00 00 0A 00 00 00 44 00 6F 00 77 00 6E 00 ........ D.o.w.n.
- [0220] 6C 00 6F 00 61 00 64 00 73 00 00 00 07 00 00 00 l.o.a.d. s.......
- [0230] 00 00 00 00 07 00 00 00 54 00 56 00 20 00 4E 00 ........ T.V. .N.
- [0240] 65 00 77 00 00 00 00 00 07 00 00 00 00 00 00 00 e.w..... ........
- [0250] 07 00 00 00 54 00 56 00 20 00 4E 00 65 00 77 00 ....T.V. .N.e.w.
- [0260] 00 00 00 00 06 00 00 00 00 00 00 00 06 00 00 00 ........ ........
- [0270] 4D 00 75 00 73 00 69 00 63 00 00 00 06 00 00 00 M.u.s.i. c.......
- [0280] 00 00 00 00 06 00 00 00 4D 00 75 00 73 00 69 00 ........ M.u.s.i.
- [0290] 63 00 00 00 07 00 00 00 00 00 00 00 07 00 00 00 c....... ........
- [02A0] 4D 00 6F 00 76 00 69 00 65 00 73 00 00 00 00 00 M.o.v.i. e.s.....
- [02B0] 07 00 00 00 00 00 00 00 07 00 00 00 4D 00 6F 00 ........ ....M.o.
- [02C0] 76 00 69 00 65 00 73 00 00 00 00 00 0A 00 00 00 v.i.e.s. ........
- [02D0] 00 00 00 00 0A 00 00 00 4D 00 6F 00 76 00 69 00 ........ M.o.v.i.
- [02E0] 65 00 73 00 20 00 34 00 4B 00 00 00 0A 00 00 00 e.s. .4. K.......
- [02F0] 00 00 00 00 0A 00 00 00 4D 00 6F 00 76 00 69 00 ........ M.o.v.i.
- [0300] 65 00 73 00 20 00 34 00 4B 00 00 00 07 00 00 00 e.s. .4. K.......
- [0310] 00 00 00 00 07 00 00 00 42 00 61 00 63 00 6B 00 ........ B.a.c.k.
- [0320] 75 00 70 00 00 00 00 00 0F 00 00 00 00 00 00 00 u.p..... ........
- [0330] 0F 00 00 00 42 00 61 00 63 00 6B 00 75 00 70 00 ....B.a. c.k.u.p.
- [0340] 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 73 00 .F.o.l. d.e.r.s.
- [0350] 00 00 00 00 0B 00 00 00 6C 00 02 00 00 00 00 00 ........ l.......
- [0360] 00 00 00 00 ....
- Got pdu len 892, data_len 868
- rpc_api_pipe: got frag len of 892 at offset 0: NT_STATUS_OK
- rpc_api_pipe: host 192.168.0.100 returned 868 bytes.
- srvsvc_NetShareEnumAll: struct srvsvc_NetShareEnumAll
- out: struct srvsvc_NetShareEnumAll
- info_ctr : *
- info_ctr: struct srvsvc_NetShareInfoCtr
- level : 0x00000001 (1)
- ctr : union srvsvc_NetShareCtr(case 1)
- ctr1 : *
- ctr1: struct srvsvc_NetShareCtr1
- count : 0x0000000b (11)
- array : *
- array: ARRAY(11)
- array: struct srvsvc_NetShareInfo1
- name : *
- name : 'IPC$'
- type : STYPE_IPC_HIDDEN (0x80000003)
- comment : *
- comment : 'IPC Service (TrueNAS Server)'
- array: struct srvsvc_NetShareInfo1
- name : *
- name : 'Comics'
- type : STYPE_DISKTREE (0x0)
- comment : *
- comment : 'Comics'
- array: struct srvsvc_NetShareInfo1
- name : *
- name : 'Documentaries'
- type : STYPE_DISKTREE (0x0)
- comment : *
- comment : 'Documentaries'
- array: struct srvsvc_NetShareInfo1
- name : *
- name : 'TV'
- type : STYPE_DISKTREE (0x0)
- comment : *
- comment : 'TV'
- array: struct srvsvc_NetShareInfo1
- name : *
- name : 'Linux ISO'
- type : STYPE_DISKTREE (0x0)
- comment : *
- comment : 'Linux ISO'
- array: struct srvsvc_NetShareInfo1
- name : *
- name : 'Downloads'
- type : STYPE_DISKTREE (0x0)
- comment : *
- comment : 'Downloads'
- array: struct srvsvc_NetShareInfo1
- name : *
- name : 'TV New'
- type : STYPE_DISKTREE (0x0)
- comment : *
- comment : 'TV New'
- array: struct srvsvc_NetShareInfo1
- name : *
- name : 'Music'
- type : STYPE_DISKTREE (0x0)
- comment : *
- comment : 'Music'
- array: struct srvsvc_NetShareInfo1
- name : *
- name : 'Movies'
- type : STYPE_DISKTREE (0x0)
- comment : *
- comment : 'Movies'
- array: struct srvsvc_NetShareInfo1
- name : *
- name : 'Movies 4K'
- type : STYPE_DISKTREE (0x0)
- comment : *
- comment : 'Movies 4K'
- array: struct srvsvc_NetShareInfo1
- name : *
- name : 'Backup'
- type : STYPE_DISKTREE (0x0)
- comment : *
- comment : 'Backup Folders'
- totalentries : *
- totalentries : 0x0000000b (11)
- resume_handle : *
- resume_handle : 0x00000000 (0)
- result : WERR_OK
- smb-network: do_mount - [smb://192.168.0.100; 1] dir = 0x7fcb8c01bbb0, cancelled = 0, errno = [0] 'Success'
- smb-network: update_cache - updating...
- smb-network: update_cache - done.
- smb-network: do_mount - login successful, res = 1
- smb-network: send_reply(0x55898e0b59c0), failed=0 ()
- smb-network: backend_dbus_handler org.gtk.vfs.Mount:QueryInfo (pid=21265)
- smb-network: Queued new job 0x55898e09a210 (GVfsJobQueryInfo)
- smb-network: send_reply(0x55898e09a210), failed=0 ()
- smb-network: backend_dbus_handler org.gtk.vfs.Mount:CreateDirectoryMonitor (pid=21265)
- smb-network: Queued new job 0x7fcb8c03e4e0 (GVfsJobCreateMonitor)
- smb-network: send_reply(0x7fcb8c03e4e0), failed=1 (Operation not supported)
- smb-network: backend_dbus_handler org.gtk.vfs.Mount:QueryFilesystemInfo (pid=21265)
- smb-network: Queued new job 0x7fcb8c03e570 (GVfsJobQueryFsInfo)
- smb-network: send_reply(0x7fcb8c03e570), failed=0 ()
- smb-network: backend_dbus_handler org.gtk.vfs.Mount:Enumerate (pid=21265)
- smb-network: Queued new job 0x55898e0ad1a0 (GVfsJobEnumerate)
- smb-network: send_reply(0x55898e0ad1a0), failed=0 ()
- smb-network: backend_dbus_handler org.gtk.vfs.Mount:QueryInfo (pid=21265)
- smb-network: Queued new job 0x55898e09a350 (GVfsJobQueryInfo)
- smb-network: send_reply(0x55898e09a350), failed=0 ()
- smb-network: backend_dbus_handler org.gtk.vfs.Mount:QueryInfo (pid=21265)
- smb-network: Queued new job 0x55898e09a3f0 (GVfsJobQueryInfo)
- smb-network: send_reply(0x55898e09a3f0), failed=0 ()
- smb-network: backend_dbus_handler org.gtk.vfs.Mount:MountMountable (pid=21265)
- smb-network: Queued new job 0x55898e09a490 (GVfsJobMountMountable)
- smb-network: send_reply(0x55898e09a490), failed=0 ()
- smb: g_vfs_backend_smb_init: default workgroup = 'NULL'
- smb: Added new job source 0x5565d088a080 (GVfsBackendSmb)
- smb: Queued new job 0x5565d088b960 (GVfsJobMount)
- INFO: Current debug levels:
- all: 10
- tdb: 10
- printdrivers: 10
- lanman: 10
- smb: 10
- rpc_parse: 10
- rpc_srv: 10
- rpc_cli: 10
- passdb: 10
- sam: 10
- auth: 10
- winbind: 10
- vfs: 10
- idmap: 10
- quota: 10
- acls: 10
- locking: 10
- msdfs: 10
- dmapi: 10
- registry: 10
- scavenger: 10
- dns: 10
- ldb: 10
- tevent: 10
- auth_audit: 10
- auth_json_audit: 10
- kerberos: 10
- drs_repl: 10
- smb2: 10
- smb2_credits: 10
- dsdb_audit: 10
- dsdb_json_audit: 10
- dsdb_password_audit: 10
- dsdb_password_json_audit: 10
- dsdb_transaction_audit: 10
- dsdb_transaction_json_audit: 10
- dsdb_group_audit: 10
- dsdb_group_json_audit: 10
- Using netbios name HOST.
- Using workgroup SAMBA.
- smb: do_mount - URI = smb://192.168.0.100/downloads
- smb: do_mount - try #0
- smbc_stat(smb://192.168.0.100/downloads)
- smb: auth_callback - kerberos pass
- smb: auth_callback - out: last_user = 'jason', last_domain = 'SAMBA'
- SMBC_server: server_n=[192.168.0.100] server=[192.168.0.100]
- -> server_n=[192.168.0.100] server=[192.168.0.100]
- Connecting to 192.168.0.100 at port 445
- socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=87040, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
- Kerberos auth with 'jason@SAMBA' (SAMBA\jason) to access '192.168.0.100' not possible
- SPNEGO login failed: {Access Denied} A process has requested access to an object but has not been granted those access rights.
- map_errno_from_nt_status: 32 bit codes: code=c0000022
- smb: do_mount - [smb://192.168.0.100/downloads; 0] res = -1, cancelled = 0, errno = [13] 'Permission denied'
- smb: do_mount - enabling NTLMSSP fallback
- smb: do_mount - try #1
- smbc_stat(smb://192.168.0.100/downloads)
- smb: auth_callback - ccache pass
- smb: auth_callback - out: last_user = 'jason', last_domain = 'SAMBA'
- SMBC_server: server_n=[192.168.0.100] server=[192.168.0.100]
- -> server_n=[192.168.0.100] server=[192.168.0.100]
- Connecting to 192.168.0.100 at port 445
- socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=87040, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
- cli_session_setup_spnego_send: Connect to 192.168.0.100 as jason@SAMBA using SPNEGO
- GENSEC backend 'gssapi_spnego' registered
- GENSEC backend 'gssapi_krb5' registered
- GENSEC backend 'gssapi_krb5_sasl' registered
- GENSEC backend 'spnego' registered
- GENSEC backend 'schannel' registered
- GENSEC backend 'naclrpc_as_system' registered
- GENSEC backend 'sasl-EXTERNAL' registered
- GENSEC backend 'ntlmssp' registered
- GENSEC backend 'ntlmssp_resume_ccache' registered
- GENSEC backend 'http_basic' registered
- GENSEC backend 'http_ntlm' registered
- GENSEC backend 'http_negotiate' registered
- Starting GENSEC mechanism spnego
- Starting GENSEC submechanism gse_krb5
- Cannot do GSE to an IP address
- Failed to start GENSEC client mech gse_krb5: NT_STATUS_INVALID_PARAMETER
- Starting GENSEC submechanism ntlmssp
- negotiate: struct NEGOTIATE_MESSAGE
- Signature : 'NTLMSSP'
- MessageType : NtLmNegotiate (1)
- NegotiateFlags : 0x62088215 (1644724757)
- 1: NTLMSSP_NEGOTIATE_UNICODE
- 0: NTLMSSP_NEGOTIATE_OEM
- 1: NTLMSSP_REQUEST_TARGET
- 1: NTLMSSP_NEGOTIATE_SIGN
- 0: NTLMSSP_NEGOTIATE_SEAL
- 0: NTLMSSP_NEGOTIATE_DATAGRAM
- 0: NTLMSSP_NEGOTIATE_LM_KEY
- 0: NTLMSSP_NEGOTIATE_NETWARE
- 1: NTLMSSP_NEGOTIATE_NTLM
- 0: NTLMSSP_NEGOTIATE_NT_ONLY
- 0: NTLMSSP_ANONYMOUS
- 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
- 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- 0: NTLMSSP_TARGET_TYPE_DOMAIN
- 0: NTLMSSP_TARGET_TYPE_SERVER
- 0: NTLMSSP_TARGET_TYPE_SHARE
- 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- 0: NTLMSSP_NEGOTIATE_IDENTIFY
- 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
- 0: NTLMSSP_NEGOTIATE_TARGET_INFO
- 1: NTLMSSP_NEGOTIATE_VERSION
- 1: NTLMSSP_NEGOTIATE_128
- 1: NTLMSSP_NEGOTIATE_KEY_EXCH
- 0: NTLMSSP_NEGOTIATE_56
- DomainNameLen : 0x0000 (0)
- DomainNameMaxLen : 0x0000 (0)
- DomainName : *
- DomainName : ''
- WorkstationLen : 0x0000 (0)
- WorkstationMaxLen : 0x0000 (0)
- Workstation : *
- Workstation : ''
- Version: struct ntlmssp_VERSION
- ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
- ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
- ProductBuild : 0x0000 (0)
- Reserved: ARRAY(3)
- [0] : 0x00 (0)
- [1] : 0x00 (0)
- [2] : 0x00 (0)
- NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
- gensec_update_send: ntlmssp[0x7f547401dd60]: subreq: 0x7f54740050f0
- gensec_update_send: spnego[0x7f5474016e60]: subreq: 0x7f54740210c0
- gensec_update_done: ntlmssp[0x7f547401dd60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7f54740050f0/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x7f54740052b0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215]
- gensec_update_done: spnego[0x7f5474016e60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7f54740210c0/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7f5474021280)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
- Got challenge flags:
- Got NTLMSSP neg_flags=0x628a8215
- NTLMSSP_NEGOTIATE_UNICODE
- NTLMSSP_REQUEST_TARGET
- NTLMSSP_NEGOTIATE_SIGN
- NTLMSSP_NEGOTIATE_NTLM
- NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- NTLMSSP_TARGET_TYPE_SERVER
- NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- NTLMSSP_NEGOTIATE_TARGET_INFO
- NTLMSSP_NEGOTIATE_VERSION
- NTLMSSP_NEGOTIATE_128
- NTLMSSP_NEGOTIATE_KEY_EXCH
- challenge: struct CHALLENGE_MESSAGE
- Signature : 'NTLMSSP'
- MessageType : NtLmChallenge (0x2)
- TargetNameLen : 0x000c (12)
- TargetNameMaxLen : 0x000c (12)
- TargetName : *
- TargetName : 'LANBOX'
- NegotiateFlags : 0x628a8215 (1653244437)
- 1: NTLMSSP_NEGOTIATE_UNICODE
- 0: NTLMSSP_NEGOTIATE_OEM
- 1: NTLMSSP_REQUEST_TARGET
- 1: NTLMSSP_NEGOTIATE_SIGN
- 0: NTLMSSP_NEGOTIATE_SEAL
- 0: NTLMSSP_NEGOTIATE_DATAGRAM
- 0: NTLMSSP_NEGOTIATE_LM_KEY
- 0: NTLMSSP_NEGOTIATE_NETWARE
- 1: NTLMSSP_NEGOTIATE_NTLM
- 0: NTLMSSP_NEGOTIATE_NT_ONLY
- 0: NTLMSSP_ANONYMOUS
- 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
- 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- 0: NTLMSSP_TARGET_TYPE_DOMAIN
- 1: NTLMSSP_TARGET_TYPE_SERVER
- 0: NTLMSSP_TARGET_TYPE_SHARE
- 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- 0: NTLMSSP_NEGOTIATE_IDENTIFY
- 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
- 1: NTLMSSP_NEGOTIATE_TARGET_INFO
- 1: NTLMSSP_NEGOTIATE_VERSION
- 1: NTLMSSP_NEGOTIATE_128
- 1: NTLMSSP_NEGOTIATE_KEY_EXCH
- 0: NTLMSSP_NEGOTIATE_56
- ServerChallenge : 8878f2a845d5d18a
- Reserved : 0000000000000000
- TargetInfoLen : 0x006a (106)
- TargetInfoMaxLen : 0x006a (106)
- TargetInfo : *
- TargetInfo: struct AV_PAIR_LIST
- count : 0x00000006 (6)
- pair: ARRAY(6)
- pair: struct AV_PAIR
- AvId : MsvAvNbDomainName (0x2)
- AvLen : 0x000c (12)
- Value : union ntlmssp_AvValue(case 0x2)
- AvNbDomainName : 'LANBOX'
- pair: struct AV_PAIR
- AvId : MsvAvNbComputerName (0x1)
- AvLen : 0x000c (12)
- Value : union ntlmssp_AvValue(case 0x1)
- AvNbComputerName : 'LANBOX'
- pair: struct AV_PAIR
- AvId : MsvAvDnsDomainName (0x4)
- AvLen : 0x0012 (18)
- Value : union ntlmssp_AvValue(case 0x4)
- AvDnsDomainName : 'local.lan'
- pair: struct AV_PAIR
- AvId : MsvAvDnsComputerName (0x3)
- AvLen : 0x0020 (32)
- Value : union ntlmssp_AvValue(case 0x3)
- AvDnsComputerName : 'lanbox.local.lan'
- pair: struct AV_PAIR
- AvId : MsvAvTimestamp (0x7)
- AvLen : 0x0008 (8)
- Value : union ntlmssp_AvValue(case 0x7)
- AvTimestamp : Wed May 4 04:27:07 AM 2022 CST
- pair: struct AV_PAIR
- AvId : MsvAvEOL (0x0)
- AvLen : 0x0000 (0)
- Value : union ntlmssp_AvValue(case 0x0)
- Version: struct ntlmssp_VERSION
- ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6)
- ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1)
- ProductBuild : 0x0000 (0)
- Reserved : 000000
- NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF)
- gensec_update_send: ntlmssp[0x7f547401dd60]: subreq: 0x7f547401a960
- gensec_update_send: spnego[0x7f5474016e60]: subreq: 0x7f5474035210
- gensec_update_done: ntlmssp[0x7f547401dd60]: NT_STATUS_WRONG_CREDENTIAL_HANDLE tevent_req[0x7f547401a960/../../auth/ntlmssp/ntlmssp.c:180]: state[3] error[-7963671676338568462 (0x917B5ACDC00002F2)] state[struct gensec_ntlmssp_update_state (0x7f547401ab20)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:218]
- gensec_spnego_client_negTokenTarg_step: SPNEGO(ntlmssp) login failed: NT_STATUS_WRONG_CREDENTIAL_HANDLE
- gensec_update_done: spnego[0x7f5474016e60]: NT_STATUS_WRONG_CREDENTIAL_HANDLE tevent_req[0x7f5474035210/../../auth/gensec/spnego.c:1631]: state[3] error[-7963671676338568462 (0x917B5ACDC00002F2)] state[struct gensec_spnego_update_state (0x7f54740353d0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2039]
- SPNEGO login failed: The supplied credential handle does not match the credential that is associated with the security context.
- map_errno_from_nt_status: 32 bit codes: code=c00002f2
- smb: do_mount - [smb://192.168.0.100/downloads; 1] res = -1, cancelled = 0, errno = [22] 'Invalid argument'
- smb: do_mount - (errno != EPERM && errno != EACCES), cancelled = 0, breaking
- smb: send_reply(0x5565d088b960), failed=1 (Failed to mount Windows share: Invalid argument)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement